cybersecurity

Image for Social Networking – Friend or Foe
Business

Social Networking – Friend or Foe

By Joanne Rogers of CS Risk Management 2012 Love it or hate it, social networking has firmly embedde...

15th November, 2012

Image for Proactive or Reactive – Should That Be The Question?
Technology

Proactive or Reactive – Should That Be The Question?

Avecto examines the difference between proactive and reactive digital forensics and explains their c...

8th November, 2012

Image for BANKING ON WIRELESS
Technology

BANKING ON WIRELESS

Banks may be nervous about employing wireless systems in a highly secure environment. But the recent...

1st November, 2012

Image for How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers
Technology

How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers

Rob Sobers, Technical Manager with data governance specialist Varonis Systems www.varonis.com, analy...

26th October, 2012

Image for Hard Tokens and The Hard Choice For Retail Banks
Banking

Hard Tokens and The Hard Choice For Retail Banks

Author: Steve Hope,Director of Winfrasoft In the world of technology it is inevitable that some will...

15th October, 2012

Image for Managing the Social Impact of Least Privilege Security
Technology

Managing the Social Impact of Least Privilege Security

Desktop Lockdown doesn’t mean taking the personal out of PC The technical problems associated with u...

15th October, 2012

Image for FBI warns criminals are targeting banks – PhishMe says they should raise their game
Banking

FBI warns criminals are targeting banks – PhishMe says they should raise their game

Commenting on an FBI warning that fraudsters are now targeting financial institutions using spam, ph...

9th October, 2012

Image for Passwords – They’re not going away so you have to get them right
Business

Passwords – They’re not going away so you have to get them right

Houston, we have a problem. There is no such thing as an un-crackable password. In 1995, the US Comp...

20th September, 2012

Image for Three Key Security Considerations for Financial Services Firms
Finance

Three Key Security Considerations for Financial Services Firms

-By Leon Ward, Field Product Manager of IT security specialists Sourcefire UK. (In this article, Leo...

16th August, 2012

Image for Blind Belief or Ignorance?
Technology

Blind Belief or Ignorance?

Five of the Most Common Security Myths that Could Make You Vulnerable While some might argue that ig...

25th July, 2012

Image for Cost-effectively dealing with the growing security compliance issue
Technology

Cost-effectively dealing with the growing security compliance issue

Michael Hamelin, Chief Security Architect with security policy management specialists Tufin Technolo...

17th July, 2012

Image for BYOD and the new IT challenges posed by the user
Technology

BYOD and the new IT challenges posed by the user

Bring Your Own Device is being heralded as the future of business computing and communication. But a...

7th July, 2012